So we had a pentest done, and we got dinged for a couple things in our AD CS environment.
The template “PHAUserCertificateTemplate” is vulnerable to ESC4 by any member of the ”Domain Users” group.
- So I opened up certserv, and went to "Manage template". And in the security of the above referenced template, it did have "Domain Users" with WRITE access. So I unchecked that. That should be all I need, right? I don't have to duplicate the template and create a new one, with a slightly different name?
It also has "Authenticated Users" with the same rights as Domain Users (Read, Enroll, Autoenroll), so I'm not sure I need to have Domain Users there at all. Can I remove Domain Users, in this scenario, since I already have Authenticated Users with those rights?
We also got dinged for
The CA “DCTRCERT002” appears to be vulnerable to ESC8.
This seems to be an NTLM relay attack, if I'm reading it correctly? So I would need to turn off NTLM completely? I'm not sure if that would break anything. Is there anything else I can do to alleviate this? I'm reading
network defenders can disable NTLM authentication using GPOs or configuring the associated IIS applications to only accept Kerberos authentication. If organizations cannot remove the endpoints or outright disable NTLM authentication, they should only allow HTTPS traffic and configure the IIS applications to Extended Protection for Authentication .
My web enrollment isn't working (I dunno why, I've just been working around it), so I dunno if I can change the IIS settings on it ...
--